Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, specification, and enforcement of adequate data protection policies. Unlike conventional database environments, a DL environment typically is characterized by a dynamic subject population, often making accesses from remote locations, and by an extraordinarily large amount of multimedia information, stored in a variety of formats. Moreover, in a DL environment, access policies are often specified based on subject qualifications and characteristics, rather than subject identity. Traditional authorization models are not adequate to meet access control requirements of DLs. In this paper, we present a Digital Library Authorization System (DLAS). D...
The conventional models of authorization have been designed for database systems supporting the hier...
This is a preprint of a paper to appear in the Proceedings of the Joint Conference on Digital Librar...
This is a submission to the "Interrogating the Social Realities of Information Systems" Preconferenc...
Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, ...
On April 6, 1998, the Digital Library Federation (DLF) and the National Science Foundation (NSF) spo...
Abstract. Security is a very relevant aspect in the implementation of most digital libraries. Two im...
Digital libraries support quick and efficient access to a large number of information sources that a...
We examine and analyze the access policies of the digital collections of ten national libraries. We ...
Digital Rights Management (DRM) is a type of technological control used by information publishers an...
Information sharing, dissemination, digital libraries, and repositories are not new concepts. Open A...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
To support non-trivial clients, such as data exploration and analysis environments, digital librarie...
Includes bibliographical references (p. 249-262).Digital rights management (DRM) can be defined as a...
Access management illustrates the process of providing controlled, and secure access to resources. I...
Digital Library Management Systems(DLMSs) generally manage collections of multi-media digitalized da...
The conventional models of authorization have been designed for database systems supporting the hier...
This is a preprint of a paper to appear in the Proceedings of the Joint Conference on Digital Librar...
This is a submission to the "Interrogating the Social Realities of Information Systems" Preconferenc...
Digital Libraries (DLs) introduce several challenging requirements with respect to the formulation, ...
On April 6, 1998, the Digital Library Federation (DLF) and the National Science Foundation (NSF) spo...
Abstract. Security is a very relevant aspect in the implementation of most digital libraries. Two im...
Digital libraries support quick and efficient access to a large number of information sources that a...
We examine and analyze the access policies of the digital collections of ten national libraries. We ...
Digital Rights Management (DRM) is a type of technological control used by information publishers an...
Information sharing, dissemination, digital libraries, and repositories are not new concepts. Open A...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
To support non-trivial clients, such as data exploration and analysis environments, digital librarie...
Includes bibliographical references (p. 249-262).Digital rights management (DRM) can be defined as a...
Access management illustrates the process of providing controlled, and secure access to resources. I...
Digital Library Management Systems(DLMSs) generally manage collections of multi-media digitalized da...
The conventional models of authorization have been designed for database systems supporting the hier...
This is a preprint of a paper to appear in the Proceedings of the Joint Conference on Digital Librar...
This is a submission to the "Interrogating the Social Realities of Information Systems" Preconferenc...